{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:14:33Z","timestamp":1757618073936,"version":"3.44.0"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s10836-025-06177-3","type":"journal-article","created":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T17:49:04Z","timestamp":1749059344000},"page":"313-338","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SFFHO: Development of Statistical Fitness-based Fire Hawk Optimizer for Software Testing and Maintenance Approach using Adaptive Deep Learning Method"],"prefix":"10.1007","volume":"41","author":[{"given":"G.","family":"Prabu","sequence":"first","affiliation":[]},{"given":"C.","family":"Sujatha","sequence":"additional","affiliation":[]},{"given":"J. Erin","family":"Shine","sequence":"additional","affiliation":[]},{"given":"T.","family":"Arulkumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,4]]},"reference":[{"key":"6177_CR1","doi-asserted-by":"crossref","unstructured":"Zhang N, Ying S, Zhu K, Zhu D (2021) Software defect prediction based on stacked sparse denoising autoencoders and enhanced extreme learning machine. 16(1):29-47","DOI":"10.1049\/sfw2.12029"},{"key":"6177_CR2","doi-asserted-by":"crossref","unstructured":"Cer\u00f3n-Figueroa S, L\u00f3pez-Mart\u00edn C (2020) Stochastic gradient boosting for predicting the maintenance effort of software-intensive systems. 14(2):82-87","DOI":"10.1049\/iet-sen.2018.5332"},{"key":"6177_CR3","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.procs.2023.01.002","volume":"218","author":"T Sharma","year":"2023","unstructured":"Sharma T, Jatain A, Bhaskar S, Pabreja K (2023) Ensemble machine learning paradigms in software defect prediction. Procedia Comput Sci 218:199\u2013209","journal-title":"Procedia Comput Sci"},{"key":"6177_CR4","doi-asserted-by":"publisher","first-page":"110542","DOI":"10.1016\/j.jss.2020.110542","volume":"164","author":"HB Braiek","year":"2020","unstructured":"Braiek HB, Khomh F (2020) On testing machine learning programs. J Syst Softw 164:110542","journal-title":"J Syst Softw"},{"key":"6177_CR5","doi-asserted-by":"crossref","unstructured":"Lehmann C, Huber LG, Horisberger T, Scheiba G, Sima AC, Stockinger K (2020) Big Data architecture for intelligent maintenance: a focus on query processing and machine learning algorithms. 7","DOI":"10.1186\/s40537-020-00340-7"},{"key":"6177_CR6","unstructured":"Rogowski R, Werbinska-Wojciechowska S (2024) Proactive Maintenance of Pump Systems in Mining Shaft Dewatering: Integrating Sensor Instrumentation and Advanced Measurement Techniques, Sensors and Electronic Instrumentation Advances 191"},{"key":"6177_CR7","doi-asserted-by":"crossref","unstructured":"Chen Y-T, Huang C-Y, Yang T-H (2023) Using multi-pattern clustering methods to improve software maintenance quality. 17(1):22","DOI":"10.1049\/sfw2.12075"},{"issue":"8","key":"6177_CR8","doi-asserted-by":"publisher","first-page":"2062","DOI":"10.51594\/csitrj.v5i8.1492","volume":"5","author":"OD Segun-Falade","year":"2024","unstructured":"Segun-Falade OD, Osundare OS, Kedi WE, Okeleke PA, Ijomah TI, Abdul-Azeez OY (2024) Assessing the transformative impact of cloud computing on software deployment and management. Comput Sci IT Res J 5(8):2062","journal-title":"Comput Sci IT Res J"},{"key":"6177_CR9","doi-asserted-by":"crossref","unstructured":"Zhu X, Li N, Wang Y (February 2022) Software change-proneness prediction based on deep learning. 34(4):17","DOI":"10.1002\/smr.2434"},{"key":"6177_CR10","unstructured":"Ikram A, AbdulJalil M, BinNgah A, Raza S, SalmanKhan A (June 2022) Project assessmentin offshore software maintenance outsourcing using deep extreme learning machines, computers, materials & Continua, 13"},{"key":"6177_CR11","doi-asserted-by":"crossref","unstructured":"Choetkiertikul M, Dam HK, Tran T, Pham T, Ragkhitwetsagul C, Ghose A (2021) Automatically recommending components for issue reports using deep learning. Empirical Softw Eng 26(14)","DOI":"10.1007\/s10664-020-09898-5"},{"key":"6177_CR12","first-page":"406","volume":"891","author":"AK Monsefi","year":"2019","unstructured":"Monsefi AK, Zakeri B, Samsam S, Khashehchi M (2019) Performing Software Test Oracle Based on Deep Neural Network with Fuzzy Inference System. High-Performance Comput Big Data Anal 891:406\u2013417","journal-title":"High-Performance Comput Big Data Anal"},{"key":"6177_CR13","doi-asserted-by":"crossref","unstructured":"Alenezi M, Akour M, Al Qasem O (2020) Harnessing deep learning algorithms to predict software refactoring. 18(6)","DOI":"10.12928\/telkomnika.v18i6.16743"},{"key":"6177_CR14","unstructured":"Malhotra R, Chug A (2012) Software Maintainability Prediction using Machine Learning Algorithms, an international J 2(2)"},{"issue":"1","key":"6177_CR15","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1007\/s10586-023-03979-y","volume":"27","author":"Alweshah M SofianK","year":"2024","unstructured":"SofianK Alweshah M, Al-Betar MA, Hammouri AI, Al-Maaitah MA (2024) Software effort estimation modeling and fully connected artificial neural network optimization using soft computing techniques. Cluster Comput 27(1):737\u2013760","journal-title":"Cluster Comput"},{"key":"6177_CR16","first-page":"1054","volume-title":"and David Bourrie","author":"D Johnson","year":"2024","unstructured":"Johnson D, McDonald JT, Benton RG (2024) and David Bourrie. Effectiveness of Image-Based Deep Learning on Token-Level Software Vulnerability Detection, IEEE Access, pp 1054\u20131063"},{"key":"6177_CR17","unstructured":"Jingda Y, Arya S, Wang Y (2024) Formal-guided fuzz testing: Targeting security assurance from specification to implementation for 5g and beyond. IEEE Access"},{"key":"6177_CR18","doi-asserted-by":"publisher","first-page":"147060","DOI":"10.1109\/ACCESS.2019.2946315","volume":"7","author":"S Siddiqui","year":"2019","unstructured":"Siddiqui S, Khan TA (2019) Test patterns for cloud applications. IEEE Access 7:147060\u2013147080","journal-title":"IEEE Access"},{"issue":"4","key":"6177_CR19","doi-asserted-by":"publisher","first-page":"1599","DOI":"10.1109\/TSE.2022.3183955","volume":"49","author":"E Dinella","year":"2023","unstructured":"Dinella E, Mytkowicz T, Svyatkovskiy A, Bird C, Naik M, Lahiri S (2023) DeepMerge: learning to merge programs. IEEE Trans Softw Eng 49(4):1599\u20131614","journal-title":"IEEE Trans Softw Eng"},{"key":"6177_CR20","unstructured":"Li K, Zhu A, Zhao P, Song J, Liu J (2024) Utilizing deep learning to optimize software development processes. J CompuT Technol Appl Math"},{"key":"6177_CR21","doi-asserted-by":"crossref","unstructured":"Borandag,E (2023) Software fault prediction using an RNN-based deep learning approach and ensemble machine learning techniques. Appl Sci 13(1639)","DOI":"10.3390\/app13031639"},{"key":"6177_CR22","doi-asserted-by":"crossref","unstructured":"Del Rey S, Mart\u00ednez-Fern\u00e1ndez S, Salmer\u00f3n A (June 2023) Bayesian Network analysis of software logs for data-driven software maintenance. IET Software 17","DOI":"10.1049\/sfw2.12121"},{"key":"6177_CR23","doi-asserted-by":"crossref","unstructured":"Sadman S Md, Islam Maruf Md S, Ahmed S, Dewan Md L, Islam Md R (2024) Discussion on the prospects of artificial intelligence in software management and maintenance. Eur J Theoretical Appl Sci 2(5)5:816-825","DOI":"10.59324\/ejtas.2024.2(5).72"},{"key":"6177_CR24","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1007\/s10619-020-07291-1","volume":"38","author":"L Xiao","year":"2020","unstructured":"Xiao L, Miao H, Shi T, Hong Yu (2020) LSTM-based deep learning for spatial\u2013temporal software testing. Distribut Parallel Databases 38:687\u2013712","journal-title":"Distribut Parallel Databases"},{"key":"6177_CR25","doi-asserted-by":"crossref","unstructured":"Bani-Salameh H, Sallam M, Al shboul B (2021) A deep-learning-based bug priority prediction using RNN-LSTM neural networks. \u2217Department of Software Engineering 15:29\u201345","DOI":"10.37190\/e-Inf210102"},{"key":"6177_CR26","doi-asserted-by":"crossref","unstructured":"Raffaella MM, Bianchini E, Sinceri S, Francesconi M, Gemignani V (2024) Software medical device maintenance: DevOps based approach for problem and modification management. J Softw: Evol Process 36(4)","DOI":"10.1002\/smr.2570"},{"key":"6177_CR27","doi-asserted-by":"crossref","unstructured":"Gunduz MZ, Resul Das (2024) Smart Grid Security: An Effective Hybrid CNN-Based approach for detecting energy theft using consumption patterns. Sensors 24(4):1148","DOI":"10.3390\/s24041148"},{"key":"6177_CR28","doi-asserted-by":"crossref","unstructured":"Azizi M, Talatahari S, Gandomi AH (2022) Fire hawk optimizer: a novel metaheuristic algorithm. Artif Intell Rev","DOI":"10.1007\/s10462-022-10173-w"},{"key":"6177_CR29","doi-asserted-by":"publisher","first-page":"2516","DOI":"10.1109\/TCYB.2021.3123625","volume":"53","author":"X Ji","year":"2021","unstructured":"Ji X, Zhang Y, Gong D, Sun X, Guo Y (2021) Multisurrogate-assisted multitasking particle swarm optimization for expensive multimodal problems. IEEE Trans Cybernetics 53:2516\u20132530","journal-title":"IEEE Trans Cybernetics"},{"key":"6177_CR30","first-page":"407","volume":"50","author":"H Alsghaier","year":"2020","unstructured":"Alsghaier H, Akour M (2020) Software fault prediction using particle swarm algorithm with genetic algorithm and support vector machine classifier. Softw: Pract Exp 50:407\u2013427","journal-title":"Softw: Pract Exp"},{"key":"6177_CR31","doi-asserted-by":"publisher","first-page":"3365","DOI":"10.1016\/j.jksuci.2021.01.015","volume":"34","author":"S Kassaymeh","year":"2022","unstructured":"Kassaymeh S, Abdullah S, Al-Betar MA, Alweshah M (2022) Salp swarm optimizer for modeling the software fault prediction problem. J King Saud Univ-Comput Inform Sci 34:3365\u20133378","journal-title":"J King Saud Univ-Comput Inform Sci"},{"key":"6177_CR32","doi-asserted-by":"publisher","first-page":"60865","DOI":"10.1109\/ACCESS.2021.3072993","volume":"9","author":"L Yang","year":"2021","unstructured":"Yang L, Li Z, Wang D, Miao H, Wang Z (2021) Software defects prediction based on hybrid particle swarm optimization and sparrow search algorithm. IEEE Access 9:60865\u201360879","journal-title":"IEEE Access"},{"key":"6177_CR33","doi-asserted-by":"crossref","unstructured":"Das H, Das S, Gourisaria MK, Khan SB, Almusharraf A, Alharbi AI, TR M (2024) Enhancing software fault prediction through feature selection with spider wasp optimization algorithm. IEEE Access","DOI":"10.1109\/ACCESS.2024.3435333"},{"key":"6177_CR34","doi-asserted-by":"crossref","unstructured":"Eivazpour Z, Keyvanpour MR (2019) Improving Performance in Software Defect Prediction Using Variational Autoencoder, 2019 5th Conference on Knowledge Based Engineering and Innovation (KBEI), Tehran, Iran, pp 644\u2013649","DOI":"10.1109\/KBEI.2019.8734915"},{"key":"6177_CR35","doi-asserted-by":"crossref","unstructured":"Lu PC, Xu MB, Gao H (2019) An improved CNN model for within-project software defect prediction. Appl Sci 9(10)","DOI":"10.3390\/app9102138"},{"key":"6177_CR36","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1016\/j.future.2019.09.025","volume":"110","author":"B Zhang","year":"2020","unstructured":"Zhang B, Xiao W, Xiao X, Kumar Sangaiah A, Zhang W, Zhang J (2020) Ransomware classification using patch-based CNN and self-attention network on embedded N-grams of opcodes. Future Gen Comput Syst 110:708\u2013720","journal-title":"Future Gen Comput Syst"},{"key":"6177_CR37","unstructured":"Chang S, Zhang Y, Han W, Yu M, Guo X, Tan W, Cui X, Witbrock M, Hasegawa-Johnson MA, Huang TS (2017) Dilated recurrent neural networks. Adv Neural Inf Process Syst"},{"key":"6177_CR38","doi-asserted-by":"publisher","first-page":"16150","DOI":"10.1109\/ACCESS.2022.3147821","volume":"10","author":"ON Oyelade","year":"2022","unstructured":"Oyelade ON, Ezugwu AE-S, Mohamed TIA, Abualigah L (2022) Ebola optimization search algorithm: a new nature-inspired metaheuristic optimization algorithm. IEEE Access 10:16150\u201316177","journal-title":"IEEE Access"},{"key":"6177_CR39","doi-asserted-by":"crossref","unstructured":"Zhong C, Li G, Meng Z (2022) Beluga whale optimization: a novel nature-inspired metaheuristic algorithm. Knowledge-Based Syst 251","DOI":"10.1016\/j.knosys.2022.109215"},{"key":"6177_CR40","doi-asserted-by":"crossref","unstructured":"Azizi M, Baghalzadeh Shishehgarkhaneh M, Basiri M, Moehler RC (2023) Squid Game Optimizer (SGO): a novel metaheuristic algorithm. Sci Rep 13(5373)","DOI":"10.1038\/s41598-023-32465-z"},{"key":"6177_CR41","doi-asserted-by":"crossref","unstructured":"Chongyan Z, Zhu J, Huang Z, Xie D, Huang Y (2023) \"CAE-based case of improving material utilization of body sheet metal parts. Int Seminar Comput Sci Eng Technol (SCSET) 453\u2013456","DOI":"10.1109\/SCSET58950.2023.00106"},{"key":"6177_CR42","doi-asserted-by":"publisher","first-page":"121207","DOI":"10.1016\/j.eswa.2023.121207","volume":"235","author":"A Pourdaryaei","year":"2024","unstructured":"Pourdaryaei A, Mohammadi M, Mubarak H, Abdellatif A, Karimi M, Gryazina E, Terzija V (2024) A new framework for electricity price forecasting via multi-head self-attention and CNN-based techniques in the competitive electricity market. Expert Syst Appl 235:121207","journal-title":"Expert Syst Appl"},{"issue":"3","key":"6177_CR43","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.3390\/app13031639","volume":"13","author":"E Borandag","year":"2023","unstructured":"Borandag E (2023) Software fault prediction using an RNN-based deep learning approach and ensemble machine learning techniques. Appl Sci 13(3):1639","journal-title":"Appl Sci"},{"key":"6177_CR44","doi-asserted-by":"crossref","unstructured":"Abbas S, Aftab S, Khan MA, Ghazal TM, Hamadi HA (2023) Data and ensemble machine learning fusion based intelligent software defect prediction system. Comput Mater Continuam 75","DOI":"10.32604\/cmc.2023.037933"},{"issue":"2","key":"6177_CR45","doi-asserted-by":"publisher","first-page":"820","DOI":"10.1109\/TR.2024.3354965","volume":"73","author":"A Abdu","year":"2024","unstructured":"Abdu A, Zhai Z, Abdo HA, Algabri R (2024) Software defect prediction based on deep representation learning of source code from contextual syntax and semantic graph. IEEE Trans Reliab 73(2):820\u2013834","journal-title":"IEEE Trans Reliab"},{"key":"6177_CR46","doi-asserted-by":"crossref","unstructured":"Fei Q, Hu H, Yin G, Sun Z (2025) \"A software defect prediction method using a multivariate heterogeneous hybrid deep learning algorithm. Comput Mater Continua 82","DOI":"10.32604\/cmc.2024.058931"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-025-06177-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-025-06177-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-025-06177-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T17:34:23Z","timestamp":1757180063000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-025-06177-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":46,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["6177"],"URL":"https:\/\/doi.org\/10.1007\/s10836-025-06177-3","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2025,6]]},"assertion":[{"value":"5 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2025","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The original online version of this article was revised due to incorrect order of affiliations.","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}},{"value":"The authors declare no conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}